Computer Hardware & Troubleshooting II Modules 7-9

0.0(0)
studied byStudied by 11 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/67

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

68 Terms

1
New cards

Supervisor Password

A password required to change BIOS/UEFI Setup

2
New cards

User Password

A password required to use the system or view BIOS/UEFI setup.

3
New cards

Drive Lock Password

A Password required to access the hard drive.

4
New cards

Windows Hello

A feature that allows a user to sign into Windows with their face, fingerprint, or PIN.

5
New cards

Windows Encrypted File System (EFS)

Encrypts files and folders stored on drive using NTFS and professional versions of Windows.

6
New cards

Bitlocker To Go

Encrypts software on a USB Flashdrive.

7
New cards

Computer Authentication

An authentication method that uses a chip called the TPM, and holds the bitlocker encryption key.

8
New cards

User Authentication

A type of encryption that allows the startup key to be stored on a USB drive.

9
New cards

Guests Group

A built-in user group that has limited privileges and is given a temporary profile that is deleted when the user logs off.

10
New cards

Power Users Group

A type of built-in user group that is on older Windows Systems. grants group members temporary access to some administrator privileges.

11
New cards

Authenticated Users Group

A group that includes all user accounts except the Guest account.

12
New cards

Everyone Group

Includes the Authenticated Users group as well as the Guest group.

13
New cards

Anonymous Users

Users who haven’t been authenticated on a remote computer.

14
New cards

Workgroup Sharing

A strategy for sharing folders in Windows, offers better security than a homegroup.

15
New cards

Domain Controlling

A strategy for sharing folders in Windows, If the computer belongs to the domain, all security is managed by the network admin for the entire network.

16
New cards

Share permissions

Grant permissions to only network users and not local users.

17
New cards

NTFS Permissions

Apply to Local Users and Network Users.

18
New cards

gpresult command

Pulls a list of all the groups a user belongs to.

19
New cards

Mapped Drive

Also known as a network drive, Is a drive hosted on another computer that is given a local drive letter (ex: Z:).

20
New cards

Administrative Shares

Folders that are shared by default that admin accounts at the domain level can access.

21
New cards

What are the two types of administrative shares?

  • %systemroot% folder

  • any volume or drive

22
New cards

Active Directory (AD)

A suite of services and databases provided by Windows Server.

23
New cards

Organizational Unit (OU)

Created to make it easier for technicians to assign privileges to users and computers.

24
New cards

Group Policy Objects (GPO)

A feature in Active Directory that allows administrators to manage settings and configurations for users and computers within a domain.

25
New cards

Logon Time Restrictions

Set time restrictions in order to perform routine maintainence.

26
New cards

Timeout and Screen Lock

Limit how long a session remains disconnected before it ends.

27
New cards

Home Folder

AD is able to change this Home folder location to a share on the network (called folder redirection).

28
New cards

What is the order in which policies are applied?

  • Local

  • Site

  • Domain

  • OU

  • Enforced

29
New cards

When setting up OUs in a new domain, why might it be useful to put all computers in one OU and all users in another?

Policies generally apply to either users or computers.

30
New cards

An app that cost you $4.99 is missing from your Android. What is the best way to restore the missing app?

Go to the Play Store where you bought the app and install it again.

31
New cards

Restrict Failed Login Attempts

Specifies that the data on the device will be deleted after a certain amount of failed login attempts, or block further attempts.

32
New cards

Full Device Encryption

Encrypts all data stored on the device.

33
New cards

Rooting

The process of obtaining root access to an android device.

34
New cards

Jailbreaking

The process of obtaining root access on an iOS device.

35
New cards

Bring Your Own Device (BYOD)

Allow an employee or student to connect their own device to a corporate network.

36
New cards

Security Profiles

A set of policies and procedures to restrict how a user can access, create, and edit the organization’s resources.

37
New cards

Android apps are contained in an Android package kit, which has what file extension?

.apk

38
New cards

Hash

A value generated by applying a specific algorithm to a file or text string.

39
New cards

MD5 Hashing Algorithm

Produces a 128-bit hash value.

40
New cards

SHA-2 Hashing Algorithm

Produces a 224-, 256-, 384-, 512-bit hash value.

41
New cards

Virtual Private Network (VPN)

Used by telecommuting employees to connect to a corporate network by way of the internet. Data is encrypted using a technique called Tunneling.

42
New cards

What ways can a VPN be managed?

Operating systems, routers, or third-party software.

43
New cards

Wireless Wide Area Network (WWAN)

Requires a contract with a cellular carrier and a USB broadband device and a SIM Card.

44
New cards

What are some wireless communication protocols that are used by IoT Devices?

  • Wi-Fi

  • Zigbee

  • Bluetooth

  • Z-Wave

45
New cards

Router

A device that manages traffic between two or more networks.

46
New cards

Port Forwarding

When a firewall receives a request for communication from the Internet to a specific computer and port, the request will be allowed and forwarded to that computer.

47
New cards

Demilitarized Zone (DMZ)

A computer or network that is not protected by a firewall or has limited protection.

48
New cards

Screened Subnet

A variation of a DMZ, and the two terms are often interchangable.

49
New cards

Blacklists

A list of things that cannot be accessed.

50
New cards

Whitelist

A list of things that can be accessed.

51
New cards

Service Set Identifier (SSID)

The name of the wireless network.

52
New cards

How many WLAN Channels are available in the US?

11

53
New cards

Remote Desktop Connection (RDC)

Gives a user access to a Windows Desktop from anywhere on the Internet.

54
New cards

Microsoft Remote Assistance (MRSA)

A user on the server computer can remain signed in during the remote session, retains control of the session, and can see the screen.

55
New cards

Virtual Networking Computing (VNC)

A client/server software used to remotely control a computer, transfer files, and screen sharing.

56
New cards

Secure Shell (SSH)

An Open-source software used to remotely sign in to and control another computer.

57
New cards

What port does SSH use?

22

58
New cards

Remote Monitoring and Management (RMM) Software

Installed on systems to monitor and manage systems remotely so IT personnel can support these systems.

59
New cards

Ping command

Tests connectivity by sending an echo request to a remote computer.

60
New cards

hostname command

Displays the hostname of a computer.

61
New cards

ipconfig command

Can display network configuration information and refresh the TCP/IP assignments for a connection.

62
New cards

nslookup command

Used to test name resolution problems with DNS servers.

63
New cards

Reverse Lookup

Allows you to use nslookup to find the host name when you know the IP Address.

64
New cards

tracert command

Can be useful when trying to resolve a problem reaching a destination host.

65
New cards

pathping command

Combines the ping and tracert commands into a single command to help identify where on the network path the network might be slow.

66
New cards

net use command

Connects or disconnects a computer from a shared resource.

67
New cards

net user command

A command that manages user accounts.

68
New cards

netstat command

Gives statistics about network activity and includes several parameters.